This presentation tells about digital marketing meaning and crimes related to it.Any illegal behavior directed by means of electronic operations. that targets the security of computer systems and the data. processed by them is termed cyber crime.
The invention of computer and Information technology related software and equipment has revolutionized the way we do things in many fields.Especially in the science, education, business and commerce it has made far reaching changes.Without using a single sheet of paper, a lot of communications and transactions are done.Automation of businesses, financial institutions and the government records have become widespread.
Many transactions such as sale of goods, transfer of information, transfer of funds and even buying air tickets could be done through the use of computers. The existing laws that governs transactions and information did not address such issues as they were made before the IT era.
2. The invention of computer and Information technology related software and equipment has
revolutionized the way we do things in many fields.Especially in the science, education,
business and commerce it has made far reaching changes.Without using a single sheet of
paper, a lot of communications and transactions are done.Automation of businesses, financial
institutions and the government records have become widespread.
Many transactions such as sale of goods, transfer of information, transfer of funds and even
buying air tickets could be done through the use of computers. The existing laws that governs
transactions and information did not address such issues as they were made before the IT era.
3. Any illegal behavior directed by means of electronic operations. that targets the security of
computer systems and the data. processed by them is termed cyber crime.
4. 1. Phishing Scams
2. Website Spoofing
3. Ransomware
4. Malware
5. IOT Hacking
(1)PHISHING SCAMS
The majority of successful cyber attacks - 91% according to a study by PhishMe - begin when
curiosity, fear, or a sense of urgency entices someone to enter personal data or click on a
link.Phishing emails mimic messages from someone you know or a business that you trust.
They are designed to trick people into giving up personal information or clicking on a malicious
link that downloads malware. Thousands of phishing attacks are launched every day.
5. (2)WEBSITE SPOOFING
The word spoof means to hoax, trick, or deceive. Website spoofing is when a website is designed to look like a
real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to
your systems, steal data, steal money, or spread malware.
Website spoofing works by replicating a legitimate website with a big company’s style, branding, user interface,
and even domain name in an attempt to trick users into entering their usernames and passwords. This is how the
bad guys capture your data or drop malware onto your computer.Spoofed websites are generally used in
conjunction with an email that links to the illegitimate website. As of last August, spoofing and phishing may have
cost businesses as much as $354 million.
(3)RANSOMWARE
Ransomware is a modern day, technical twist on a crime that has been around for ages - extortion. At its core,
ransomware works when criminals steal something of great value and demand payment in exchange for its return.
For most businesses, this involves the encryption of company data. When ransomware hits, businesses come to a
standstill, and employees cannot do their jobs.Without restorable backup data, the company is generally at the
mercy of the attacker who will hold your data hostage in exchange for a decryption key you can buy with Bitcoin.
Ransomware has matured into its own category of malware and should be a primary concern for all organizations.
According to new research, ransomware breaches have increased by 13% – more than the last five years
combined.
6. (4)MALWARE
Norton defines malware as “malicious software” specifically designed to gain access to or damage a computer. In the case of ransomware, it's designed to
hold your data hostage, but that isn’t the only kind. There can be multiple objectives for malware - power, influence, money, information - but the result is
always the same - a time consuming, often expensive recovery effort.
Common types of malware include:
●Viruses that spread, damage functionality, and corrupt files.
●Trojans disguised as legitimate software that quietly create backdoors to let other malware into your network.
●Worms that can infect all of the devices connected to a network.
●Ransomware that holds your data hostage
Botnets - a network of infected devices that work together under the control of an attacker.
(5)IOT HACKING
The Internet of Things is a brave new world that has opened insights into our daily routines and our business processes to the web. Whether we like it or not,
all of these internet-connected objects are collecting and exchanging data. As you know, data is valuable and for that reason, hackers will look to exploit any
devices that aggregate it.
The more “things” we connect - the juicier the reward becomes for hackers. That’s why it’s important to remember that personal passwords and business
passwords all belong to humans… with memories that we know are going to let us down from time to time.
7. 1.Stay Up to Date
It goes without saying but having the most up-to-date security software provides better
protection against hackers, malware, viruses, and more. This is only one piece of the actions
you can take, but an important one.
2.Be Smart with Devices
That computer, smart phone, tablet, and social media site you can’t get enough of are also
avenues for bad actors to steal data. It’s not a complete doomsday scenario. Each device or
site normally has security settings in the form of pins, passwords, and control over who sees
your content. Brush up on security features and use them to your advantage. And, finally, be
smart. Don’t share passwords, codes or pins with anyone.
8. 3.Don’t Go Public If You Can
That free WIFI stores, restaurants, and other public places offer may be free, but it can come
with collateral fallout. In other words, free may come with a cost if you’re not careful.
Keep this in mind: if it’s free to you, it’s also free to threat actors. Be careful entering any
personal information, using apps with passwords or entering login information, because hackers
can see what you’re doing. The best advice is to steer clear of public WIFI, or simply don’t enter
any data that can be compromised.
4.Simple and Easy
When not using a computer, smart phone, tablet or any other device that has connectivity,
simply lock or log off when you’re not using them. Visions of bad actors conjure up faceless
hackers who live in the ether but be aware that they also exist in the flesh. Leave that laptop
unlocked, step away for even a few minutes, and anyone can walk up and gain instant access.
9. 5.Don’t Phish
Follow an adage as old as the hills: if it’s too good to be true, then it probably is. The same
applies when you come across a link, text, email, online advertising or website that looks
inviting, yet suspicious. Be vigilant about any types of these — including credit card company
phone calls — requesting personal information. If they immediately request personal data, or
information, be weary.
6.Minimize Info
Sure, businesses are trying to capture personal information for marketing and third-party
services, but it’s best to steer away from entering data like birthdates, social security numbers,
and any other information tied to your identity. It leaves a digital footprint that hackers love.
10. Data plays an integral role in the commission of many cybercrimes and vulnerabilities to
cybercrime. Even though data provides users of it (individuals, private companies,
organizations, and governments) with innumerable opportunities, these benefits can be (and
have been) exploited by some for criminal purposes. Specifically, data collection, storage,
analysis, and sharing both enables many cybercrimes and the vast collection, storage, use, and
distribution of data without users' informed consent and choice and necessary legal and
security protections. What is more, data aggregation, analysis, and transfer occur at scales that
governments and organizations are unprepared for, creating a slew of cybersecurity risks.
Privacy, data protection, and security of systems, networks, and data are interdependent. In
view of that, to protect against cybercrime, security measures are needed that are designed to
protect data and user's privacy.